diff --git a/example/crs-shellphish-aijon/compose.yaml b/example/crs-shellphish-aijon/compose.yaml new file mode 100644 index 00000000..34f9ef09 --- /dev/null +++ b/example/crs-shellphish-aijon/compose.yaml @@ -0,0 +1,38 @@ +############################################################################## +# CRS Compose Configuration # +# Shellphish AIJON (IJON-enhanced AFL++ fuzzing with LLM) # +############################################################################## + +# --- General Settings ------------------------------------------------------- +run_env: local +docker_registry: local + +# --- Infrastructure --------------------------------------------------------- +oss_crs_infra: + cpuset: "0-1" + memory: "8G" + +# --- LLM Configuration ----------------------------------------------------- +llm_config: + litellm: + mode: external + model_check: false + external: + url_env: AIXCC_LITELLM_HOSTNAME + key_env: LITELLM_KEY + +# --- CRS (Shellphish AIJON) ------------------------------------------------ +# Pipeline: AFL++ fuzzer + coverage tracer (→ AG) + AIJON instrumentation +# (LLM → IJON patch) + AIJON builder (compile with IJON) + AIJON fuzzer. +# +# For local development, add source.local_path: +# crs-shellphish-aijon: +# source: +# local_path: /path/to/shellphish-oss-crs +# cpuset: "2-7" +# memory: "24G" +# llm_budget: 10 +crs-shellphish-aijon: + cpuset: "2-7" + memory: "24G" + llm_budget: 10 diff --git a/example/crs-shellphish-c-fuzzers-aflpp/compose.yaml b/example/crs-shellphish-c-fuzzers-aflpp/compose.yaml new file mode 100644 index 00000000..7c6ceb51 --- /dev/null +++ b/example/crs-shellphish-c-fuzzers-aflpp/compose.yaml @@ -0,0 +1,28 @@ +############################################################################## +# CRS Compose Configuration # +# Shellphish C Fuzzers — AFL++ only # +############################################################################## + +# --- General Settings ------------------------------------------------------- +run_env: local +docker_registry: local + +# --- Infrastructure --------------------------------------------------------- +oss_crs_infra: + cpuset: "0-1" + memory: "8G" + +# --- CRS (Shellphish C Fuzzers — AFL++) ----------------------------------- +# AFL++ multi-instance fuzzing (1 main + N-1 secondary). +# All available cores go to AFL++. +# Pure fuzzer — no LLM needed. +# +# For local development, add source.local_path: +# crs-shellphish-c-fuzzers-aflpp: +# source: +# local_path: /path/to/shellphish-oss-crs +# cpuset: "2-7" +# memory: "24G" +crs-shellphish-c-fuzzers-aflpp: + cpuset: "2-7" + memory: "24G" diff --git a/example/crs-shellphish-c-fuzzers-libfuzzer/compose.yaml b/example/crs-shellphish-c-fuzzers-libfuzzer/compose.yaml new file mode 100644 index 00000000..a18c2f2c --- /dev/null +++ b/example/crs-shellphish-c-fuzzers-libfuzzer/compose.yaml @@ -0,0 +1,28 @@ +############################################################################## +# CRS Compose Configuration # +# Shellphish C Fuzzers — LibFuzzer only # +############################################################################## + +# --- General Settings ------------------------------------------------------- +run_env: local +docker_registry: local + +# --- Infrastructure --------------------------------------------------------- +oss_crs_infra: + cpuset: "0-1" + memory: "8G" + +# --- CRS (Shellphish C Fuzzers — LibFuzzer) -------------------------------- +# LibFuzzer with wrapper.py (fork mode). +# All available cores go to LibFuzzer. +# Pure fuzzer — no LLM needed. +# +# For local development, add source.local_path: +# crs-shellphish-c-fuzzers-libfuzzer: +# source: +# local_path: /path/to/shellphish-oss-crs +# cpuset: "2-7" +# memory: "24G" +crs-shellphish-c-fuzzers-libfuzzer: + cpuset: "2-7" + memory: "24G" diff --git a/example/crs-shellphish-discoveryguy/compose.yaml b/example/crs-shellphish-discoveryguy/compose.yaml new file mode 100644 index 00000000..a33f76ad --- /dev/null +++ b/example/crs-shellphish-discoveryguy/compose.yaml @@ -0,0 +1,38 @@ +############################################################################## +# CRS Compose Configuration # +# Shellphish DiscoveryGuy (LLM-driven bug-finding) # +############################################################################## + +# --- General Settings ------------------------------------------------------- +run_env: local +docker_registry: local + +# --- Infrastructure --------------------------------------------------------- +oss_crs_infra: + cpuset: "0-1" + memory: "8G" + +# --- LLM Configuration ----------------------------------------------------- +llm_config: + litellm: + mode: external + model_check: false + external: + url_env: AIXCC_LITELLM_HOSTNAME + key_env: LITELLM_KEY + +# --- CRS (Shellphish DiscoveryGuy) ----------------------------------------- +# LLM-driven vulnerability discovery: analyzes code with LLM, generates +# exploit scripts, verifies crashes, submits PoVs. +# +# For local development, add source.local_path: +# crs-shellphish-discoveryguy: +# source: +# local_path: /path/to/shellphish-oss-crs +# cpuset: "2-7" +# memory: "24G" +# llm_budget: 10 +crs-shellphish-discoveryguy: + cpuset: "2-7" + memory: "24G" + llm_budget: 10 diff --git a/example/crs-shellphish-grammar/compose.yaml b/example/crs-shellphish-grammar/compose.yaml new file mode 100644 index 00000000..f079a8e2 --- /dev/null +++ b/example/crs-shellphish-grammar/compose.yaml @@ -0,0 +1,38 @@ +############################################################################## +# CRS Compose Configuration # +# Shellphish Grammar (LLM-driven grammar fuzzing with AFL++) # +############################################################################## + +# --- General Settings ------------------------------------------------------- +run_env: local +docker_registry: local + +# --- Infrastructure --------------------------------------------------------- +oss_crs_infra: + cpuset: "0-1" + memory: "8G" + +# --- LLM Configuration ----------------------------------------------------- +llm_config: + litellm: + mode: external + model_check: false + external: + url_env: AIXCC_LITELLM_HOSTNAME + key_env: LITELLM_KEY + +# --- CRS (Shellphish Grammar) ---------------------------------------------- +# Pipeline: AFL++ fuzzer + coverage tracer + Grammar-Guy (LLM grammar gen) +# + GrammarRoomba (grammar refinement) + coverage-guy. +# +# For local development, add source.local_path: +# crs-shellphish-grammar: +# source: +# local_path: /path/to/shellphish-oss-crs +# cpuset: "2-7" +# memory: "24G" +# llm_budget: 10 +crs-shellphish-grammar: + cpuset: "2-7" + memory: "24G" + llm_budget: 10 diff --git a/example/crs-shellphish-jvm-fuzzers/compose.yaml b/example/crs-shellphish-jvm-fuzzers/compose.yaml new file mode 100644 index 00000000..09efded8 --- /dev/null +++ b/example/crs-shellphish-jvm-fuzzers/compose.yaml @@ -0,0 +1,27 @@ +############################################################################## +# CRS Compose Configuration # +# Shellphish JVM Fuzzers (Jazzer + LOSAN sanitizers) # +############################################################################## + +# --- General Settings ------------------------------------------------------- +run_env: local +docker_registry: local + +# --- Infrastructure --------------------------------------------------------- +oss_crs_infra: + cpuset: "0-1" + memory: "8G" + +# --- CRS (Shellphish JVM Fuzzers) ----------------------------------------- +# Jazzer-based Java/JVM fuzzing with LOSAN sanitizers. +# Pure fuzzer — no LLM needed. +# +# For local development, add source.local_path: +# crs-shellphish-jvm-fuzzers: +# source: +# local_path: /path/to/shellphish-oss-crs +# cpuset: "2-7" +# memory: "24G" +crs-shellphish-jvm-fuzzers: + cpuset: "2-7" + memory: "24G" diff --git a/example/crs-shellphish-quickseed/compose.yaml b/example/crs-shellphish-quickseed/compose.yaml new file mode 100644 index 00000000..cf4b0481 --- /dev/null +++ b/example/crs-shellphish-quickseed/compose.yaml @@ -0,0 +1,39 @@ +############################################################################## +# CRS Compose Configuration # +# Shellphish QuickSeed (LLM-driven Java seed generation) # +############################################################################## + +# --- General Settings ------------------------------------------------------- +run_env: local +docker_registry: local + +# --- Infrastructure --------------------------------------------------------- +oss_crs_infra: + cpuset: "0-1" + memory: "8G" + +# --- LLM Configuration ----------------------------------------------------- +llm_config: + litellm: + mode: external + model_check: false + external: + url_env: AIXCC_LITELLM_HOSTNAME + key_env: LITELLM_KEY + +# --- CRS (Shellphish QuickSeed) ------------------------------------------- +# LLM-driven seed generation for Java targets: static analysis → CodeQL → +# code-swipe ranking → LLM generates seeds traversing vulnerable paths → +# seeds delivered to Jazzer via fuzzer_sync. +# +# For local development, add source.local_path: +# crs-shellphish-quickseed: +# source: +# local_path: /path/to/shellphish-oss-crs +# cpuset: "2-7" +# memory: "24G" +# llm_budget: 10 +crs-shellphish-quickseed: + cpuset: "2-7" + memory: "24G" + llm_budget: 10 diff --git a/example/crs-shellphish/compose.yaml b/example/crs-shellphish/compose.yaml deleted file mode 100644 index 4bef498c..00000000 --- a/example/crs-shellphish/compose.yaml +++ /dev/null @@ -1,29 +0,0 @@ -############################################################################## -# CRS Compose Configuration # -# Shellphish CRS (bug-finding) # -############################################################################## - -# --- General Settings ------------------------------------------------------- -run_env: local -docker_registry: local - -# --- Infrastructure --------------------------------------------------------- -oss_crs_infra: - cpuset: "0-3" - memory: "16G" - -# --- CRS (Shellphish) ------------------------------------------------------ -# Shellphish CRS with AFL++ v4.30c and modified LibFuzzer in parallel. -# Use oss_crs_scheduler.py to set core allocation (AFLPP_CPUS, LIBFUZZER_CPUS). -# -# With registry (auto-clones from GitHub): -# crs-shellphish: -# cpuset: "4-15" -# memory: "48G" -# -# With local path (for development): -crs-shellphish: - source: - local_path: /project/shellphish-oss-crs - cpuset: "4-15" - memory: "48G" diff --git a/registry/crs-shellphish.yaml b/registry/crs-shellphish-aijon.yaml similarity index 62% rename from registry/crs-shellphish.yaml rename to registry/crs-shellphish-aijon.yaml index 7945be9c..bf931b29 100644 --- a/registry/crs-shellphish.yaml +++ b/registry/crs-shellphish-aijon.yaml @@ -1,6 +1,6 @@ -name: crs-shellphish +name: crs-shellphish-aijon type: - bug-finding source: url: https://github.com/Team-Atlanta/shellphish-oss-crs.git - ref: main + ref: crs-shellphish-aijon diff --git a/registry/crs-shellphish-c-fuzzers-aflpp.yaml b/registry/crs-shellphish-c-fuzzers-aflpp.yaml new file mode 100644 index 00000000..16fd4c3d --- /dev/null +++ b/registry/crs-shellphish-c-fuzzers-aflpp.yaml @@ -0,0 +1,6 @@ +name: crs-shellphish-c-fuzzers-aflpp +type: + - bug-finding +source: + url: https://github.com/Team-Atlanta/shellphish-oss-crs.git + ref: crs-shellphish-c-fuzzers-aflpp diff --git a/registry/crs-shellphish-c-fuzzers-libfuzzer.yaml b/registry/crs-shellphish-c-fuzzers-libfuzzer.yaml new file mode 100644 index 00000000..f34e3b85 --- /dev/null +++ b/registry/crs-shellphish-c-fuzzers-libfuzzer.yaml @@ -0,0 +1,6 @@ +name: crs-shellphish-c-fuzzers-libfuzzer +type: + - bug-finding +source: + url: https://github.com/Team-Atlanta/shellphish-oss-crs.git + ref: crs-shellphish-c-fuzzers-libfuzzer diff --git a/registry/crs-shellphish-discoveryguy.yaml b/registry/crs-shellphish-discoveryguy.yaml new file mode 100644 index 00000000..53de1e0f --- /dev/null +++ b/registry/crs-shellphish-discoveryguy.yaml @@ -0,0 +1,6 @@ +name: crs-shellphish-discoveryguy +type: + - bug-finding +source: + url: https://github.com/Team-Atlanta/shellphish-oss-crs.git + ref: crs-shellphish-discoveryguy diff --git a/registry/crs-shellphish-grammar.yaml b/registry/crs-shellphish-grammar.yaml new file mode 100644 index 00000000..56d0a53e --- /dev/null +++ b/registry/crs-shellphish-grammar.yaml @@ -0,0 +1,6 @@ +name: crs-shellphish-grammar +type: + - bug-finding +source: + url: https://github.com/Team-Atlanta/shellphish-oss-crs.git + ref: crs-shellphish-grammar diff --git a/registry/crs-shellphish-jvm-fuzzers.yaml b/registry/crs-shellphish-jvm-fuzzers.yaml new file mode 100644 index 00000000..d9a7534a --- /dev/null +++ b/registry/crs-shellphish-jvm-fuzzers.yaml @@ -0,0 +1,6 @@ +name: crs-shellphish-jvm-fuzzers +type: + - bug-finding +source: + url: https://github.com/Team-Atlanta/shellphish-oss-crs.git + ref: crs-shellphish-jvm-fuzzers diff --git a/registry/crs-shellphish-quickseed.yaml b/registry/crs-shellphish-quickseed.yaml new file mode 100644 index 00000000..797184d9 --- /dev/null +++ b/registry/crs-shellphish-quickseed.yaml @@ -0,0 +1,6 @@ +name: crs-shellphish-quickseed +type: + - bug-finding +source: + url: https://github.com/Team-Atlanta/shellphish-oss-crs.git + ref: crs-shellphish-quickseed